Page 224 - Privacy in a Cyber Age Policy and Practice
P. 224
212 NOTES
22. This is a bit of a simplification, but largely captures the NSA’s operating
procedures. For a more nuanced discussion, see Marc Ambinder, “How the
NSA Uses Your Telephone Records,” The Week, June 6, 2013, http://theweek.
com/article/index/245285/how-the-nsa-uses-your-telephone-records.
23. Jack Nicas, “TSA to Halt Revealing Body Scans at Airports,” Wall Street Journal,
January 18, 2013.
24. Legal Information Institute, “Fourth Amendment,” Cornell University Law
School. http://www.law.cornell.edu/wex/fourth_amendment (accessed 12 July
2013).
25. See Electronic Privacy Information Center v. United States Department of
Homeland Security, 653 F.3d 1, 10–11 (D.C. Cir. 2011); and National Treasury
Employees Union v. Von Raab, 489 U.S. 656, 674–675 & n.3 (1989).
26. See Michigan Department of State Police v. Sitz, 110 S. Ct. 2481 (1990).
27. See Skinner v. Railway Labor Executives’ Association, 489 U.S. 602 (1989); and
National Treasury Employees Union v. Von Raab, 489 U.S. 656 (1989).
28. USA Patriot Act. Pub. L. 107-56. 115 Stat. 272. October 26, 2011. Accessed at
http://www.gpo.gov/fdsys/pkg/PLAW-107publ56/html/PLAW-107publ56.htm
29. Scott Shane and David E. Sanger, “Job Title Key to Inner Access Held
by Snowden,” The New York Times, June 30, 2013, http://www.nytimes.
com/2013/07/01/us/job-title-key-to-inner-access-held-by-snowden.html?
pagewanted=all.
30. Jeffrey Rosen, “The Naked Crowd: Balancing Privacy and Security in an Age of
Terror,” Arizona Law Review 46 (2004): 611.
31. Beth Givens, “Public Records on the Internet: The Privacy Dilemma,” Privacy
Rights Clearinghouse, http://www.cfp2002.org/proceedings/proceedings/
givens.pdf.
32. See Amitai Etzioni and Radhika Bhat, “Second Chances, Social Forgiveness, and
the Internet,” The American Scholar (Spring 2009), http://theamericanscholar.
org/second-chances-social-forgiveness-and-the-internet/#.Udx70DtilJk.
33. Most recent numbers from 2011. Federal Bureau of Investigation, “Clear-
ances,” Crime in the United States, 2011, http://www.fbi.gov/about-us/cjis/ucr/
crime-in-the-u.s/2011/crime-in-the-u.s.-2011/clearances.
34. Matthew C. Waxman, in an interview with Jonathan Masters, “Has the FISA Court
Gone Too Far?” Council on Foreign Relations, July 12, 2013, http://www.cfr.org/
intelligence/has-fisa-court-gone-too-far/p31095. See also, Shaun Waterman,
“Officials Say Americans Protected by Prism Surveillance Program,” The Wash-
ington Times, June 10, 2013, http://www.washingtontimes.com/news/2013/
jun/10/officials-say-americans-protected-by-prism-surveil/?page=all.
35. See, for example, GAO-05-866 “Agencies have Taken Key Steps to Protect Pri-
vacy in Selected Efforts, but Significant Compliance Issues Remain” (August
2005); GAO-08-536 “Alternatives Exist for Enhancing Protection of Personally
Identifiable Information” (May 2008); GAO-12-961T “Federal Law Should Be
Updated to Address Changing Technology Landscape” (July 2012); or GAO-
12-981 “Measuring Progress and Addressing Potential Privacy Concerns Would
Facilitate Integration into the National Airspace System” (September 2012).